[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: A bit of background on [RFC3580] Section 5.3



Bernard Aboba <aboba@internaut.com> wrote:
> As a result, Section 5.3 is attempting to discourage the 
> use of PAP and the potential cascading vulnerablities that
> can result. 

  It would be clearer for the average reader is some document said
outright "PAP is deprecated.  Don't use it."

> If PAP cannot be deprecated entirely, then it is best if its 
> use is isolated to accounts that have limited access rights.  

  On the same NAS that uses EAP... leading to leveraged attacks.

> If these principles are followed, it possible to limit the 
> use of PAP without forcing a RADIUS proxy to utilize a 
> different IP address for PAP and EAP authentication.

  Would there be interested in a PAP replacement?  Something like
Tunnel-Password comes to mind.  A 16-bit salt would make attacks more
difficult, but if the salt is coming from the same low-entropy pool as
the RA, I'm not sure it would help.

  Quoting out of order:

> For example, a NAS can attempt to satisfy the global uniqueness
> property by utilizing the IP address in the high order bits of the
> RA and then utilizing a pseudo-random number in the low order bits.

  Is it worth codifying recommendations?  i.e. RA = (IP + counter +
pseudo-random number + ...)  That would help guide implementors, at
least.

  Alan DeKok.

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>